KR101441567B1 - Method for Sending M2M Data through IMS Network and M2M Service Platform therefor - Google Patents

Method for Sending M2M Data through IMS Network and M2M Service Platform therefor Download PDF

Info

Publication number
KR101441567B1
KR101441567B1 KR1020130023315A KR20130023315A KR101441567B1 KR 101441567 B1 KR101441567 B1 KR 101441567B1 KR 1020130023315 A KR1020130023315 A KR 1020130023315A KR 20130023315 A KR20130023315 A KR 20130023315A KR 101441567 B1 KR101441567 B1 KR 101441567B1
Authority
KR
South Korea
Prior art keywords
user terminal
data
m2m service
m2m
service platform
Prior art date
Application number
KR1020130023315A
Other languages
Korean (ko)
Other versions
KR20140109085A (en
Inventor
구범모
Original Assignee
주식회사 케이티
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 케이티 filed Critical 주식회사 케이티
Priority to KR1020130023315A priority Critical patent/KR101441567B1/en
Publication of KR20140109085A publication Critical patent/KR20140109085A/en
Application granted granted Critical
Publication of KR101441567B1 publication Critical patent/KR101441567B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1066Session control
    • H04L65/1073Registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1003Signalling or session protocols
    • H04L65/1006SIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/005Context aware security
    • H04W12/0051Identity aware
    • H04W12/00518Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/04Key management, e.g. by generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/06Authentication

Abstract

According to another aspect of the present invention, there is provided a method for delivering data available to a first user terminal subscribed to an M2M service platform to a second user terminal not subscribed to the M2M service platform through an IMS network, Transmitting a registration request message to the second user terminal through the IMS network in response to a request from the second user terminal; Allowing the second user terminal to perform provisional registration for granting a use right of the M2M service platform; And establishing a signal path through the IMS network and transferring the data to the second user terminal using the signal path.

Description

METHOD FOR SUBMITTING M2M DATA USING IMS NETWORK AND M2M SERVICE PLATFORM FOR THE SAME

The present invention relates to an M2M data delivery method through an IMS network and an M2M service platform for the same, and more particularly, to an M2M data delivery method for delivering data between NAs of an M2M service platform, M2M service platform.

 Machine-to-machine (M2M) refers to communication for providing object information to a person or an intelligent device by using a broadcast communication network, or for controlling a state of an object by a person or an intelligent device. M2M is also called the Internet of Things (IOT) and Object to Object Intelligent Network (O2N).

If M2M communication in the past and the latter half of the 1990s meant one-to-one or many-to-many communication for simple point-to-point (P2P) connection, then ultimately the aim of M2M communication is to introduce location awareness, situational awareness, , Etc., aiming at the quality and stability of the improved M2M communication service by automatically operating without human control or with human intervention minimally.

M2M communication can be utilized as an essential infrastructure to solve social problems, prevent disasters and disasters, and save energy through u-City, u-Health, u-transportation, and u-environment projects. Currently, a wide variety of services such as remote meter reading, building and facility management, vending machine management, indoor lighting control service, traffic information and vehicle control, emergency dispatch, fire alarm, security alarm device, vending machine, telematics, . In recent years, application to medical apparatuses such as a pulse system and an electrocardiogram system has been actively carried out in the field of e-health including telemedicine services.

M2M communication is a communication between object devices, and differs from existing human-centered human-to-human communication (H2H) in various features. From these differences, technically necessary technologies can be changed, and the required characteristics may be slightly different depending on the field of application using M2M communication. Currently, research and development for the standardization of successful M2M communication is continuing in the standardization groups of the world including the European Telecommunication Standard Institute (ETSI). FIG. 1 is a block diagram of an ETSI TS 102 (Technical Specification) 102 690 [Machine-to-Machine Communications (M2M); Functional architecture], and the architecture for an M2M service that includes a gateway domain and a network domain. Hereinafter, the contents of the standardization work performed in ETSI including the ETSI TS (Technical Specification) 102 690 will be referred to as " ETSI standard ".

Referring to FIG. 1, the M2M devices 10 and 10 'are terminals for communicating with no human input or intervention, or minimizing the input and interruption thereof. Type of device.

According to the ETSI standard, when the M2M device 10 'directly connects to the access network 40, the M2M device 10' uses the M2M service capability 11 of the M2M device 10 ' It is defined that the M2M device 10 executes the device application DA 12 as an application (M2M Application) and when the M2M device 10 accesses the access network 40 through the M2M gateway 30, M2M service capability (31).

The M2M area network (20) also provides a connection between the M2M device (10) and the M2M gateway (30). Examples of the M2M local area network 20 include a Personal Area Network (PAN) or a Wireless Local Area Network (LAN), such as IEEE 802.15.x, Zigbee, Bluetooth, IETF ROLL, ISA100.11a, Area Network (hereinafter also referred to as "LAN"), PLC, M-BUS, Wireless M-BSU, and KNX.

The M2M gateway 30 is a gateway that executes the gateway application GA 32 which is the M2M application of the M2M gateway 30 using the M2M service capability 31 and is a gateway between the M2M device 10 and the access network 40 It acts as a proxy.

The access network 40 is a network that allows the M2M devices 10 'through M2M gateways 30 to communicate with the core network 50. Examples of the access network 40 include xDSL, HFC, FTTH, PLC, Satellite network, GERAN, UTRAN, eUTRAN, Wireless LAN, WiMAX (WiBro) and the like.

The core network 50 is a network that provides IP connectivity, access network control and network service control functions, interconnection with other networks, roaming functions, and the like. Examples of the core network 50 include 3GPP CN, ETSI TISPAN CN, 3GPP2 CN, and IMS.

The M2M service capability 60 of the network domain provides functionality that can be shared by different applications and provides an environment for accessing other service capabilities through an open interface. With such M2M service capabilities, it is possible to develop and deploy optimal applications without considering the characteristics of the lower network layer.

Network applications (NA) 70, which are M2M applications in a network domain, run M2M service logic and utilize M2M service capabilities through an open interface to provide in the M2M system.

Meanwhile, according to FIG. 1, the network domain is defined to include M2M management functions and network management functions. Here, the M2M management functions 80 are configured with all the functions required to manage M2M service capabilities in the network domain, and the management of the M2M devices to the M2M gateway utilizes a specific M2M service capability . Network management functions 90 are also comprised of all the functions required to manage the access network 40 and the core network 50 and include provisioning, supervision, fault management, And the like.

According to the ETSI standard, the layer representing the M2M service capabilities in the network domain is referred to as a network service capability layer (NSCL) and the layer representing the M2M service capabilities of the gateway is referred to as a gateway service capability layer A service capability layer (hereinafter referred to as "GSCL"), and a layer representing M2M service capabilities of an M2M device is defined as a Device Service Capability Layer (DSCL). The NSCL, GSCL, and DSCL are collectively referred to as a service capability layer (SCL). Herein, NSCL means a platform that is individually constructed for each service by a service provider providing each M2M service, and is hereinafter also referred to as an " M2M service platform ".

The ETSI standard specifies that the communication between the DA 12 and the DSCL 11 of the M2M device 10 'and between the M2M device 10 and the gateway 30 GSCL 31 and between the GA 32 of the gateway 30 and A reference point between GSCL 31 and GSCL 31 is denoted by dIa and a reference point between DSCL 11 and GSCL 31 and NSCL 60 is denoted by mId and a reference point between NA 70 and NSCL 60 is denoted by reference point Is defined as mIa.

However, as described in the current ETSI standards, only the environment in which the M2M service platform is independently constructed between M2M service providers is considered. Therefore, there is a problem that the consumption of the M2M data is limited to the data accumulated in the NSCL platform to which the M2M data belongs. In other words, no consideration is given to a method of transferring or using data stored in the other's M2M service platform between NAs of a plurality of M2M service platforms established by different M2M service providers.

FIG. 2 is an illustration for explaining that data accumulated in different M2M service platforms in an environment according to the ETSI standard is not available.

2, an M2M service platform 11 using, for example, various M2M devices (each of which is divided into DSCL # 1, DSCL # 2, ..., DSCL # N by DSCL implemented in the device) It is assumed that the M2M service related to the M2M device is provided through the NA A 33 of the terminal of the user A subscribed to the first communication network 100. Meanwhile, it is assumed that the user C is a user subscribed to another communication network 300 that is not related to the M2M service platform 100 at all.

In this case, according to the network structure of the current ETSI standard, since the consumption of the M2M data is limited to the data stored in the M2M service platform to which the user belongs, the user C transmits the data to the first communication network 100 There is a problem that the data stored in the container 101 of the M2M service platform 11 provided by the user can not be used through the NA C 35 of the user.

Meanwhile, in the environment where the M2M service platform between the communication terminals is independently constructed as described above, the use request for the data stored in the other M2M service platform may occur in various situations.

First, for example, the home monitoring service provided through the first communication network 100 is registered in the name of one of the family members (i.e., the user A), but the other one of the family members (i.e., the user C) When the user C is subscribed to the second communication network 300 other than the communication network 100, the user C receives image data provided by the home monitoring service which is not a subscriber of the first communication network 100 but is established in the first communication network 100 Situations where you want to view can happen.

In addition, for example, when the user A who is subscribed to the security-related M2M service recognizes the emergency situation and then transmits the intrusion information of the house to a third party subscribed to another mobile communication network, the third party monitors the emergency The desired situation can also be considered.

Although there is a demand for data usage between different M2M service platforms, the ETSI standard does not specify the details. The reason for this is that there are many prerequisite issues related to management of subscriber and terminal profiles, routing to addresses and other networks, security for signaling and data transmission, billing, etc., in order to use data between different M2M service platforms.

SUMMARY OF THE INVENTION The present invention has been made to solve the above problems of the related art, and it is an object of the present invention to provide a method and system for exchanging data between NAs of different M2M service platforms, The purpose of this document is to solve all the requirements of

In order to achieve the above object, according to an embodiment of the present invention, there is provided a method for transmitting data, which can be used by a first user terminal subscribed to an M2M service platform, to a second user terminal not subscribed to the M2M service platform Transmitting a registration request message to the second user terminal through the IMS network in response to a request from the first user terminal; Allowing the second user terminal to perform provisional registration for granting a use right of the M2M service platform; And establishing a signal path through the IMS network and transferring the data to the second user terminal using the signal path.

 Here, the registration request message may be a SIP message including address information of the M2M service platform, and the SIP message may further include an encryption key for data use of the second user terminal.

The method may further include transmitting the registration request message to the second user terminal using the domain information of the communication network to which the second user terminal received from the ENUM server belongs.

The step of permitting temporary registration may further include transmitting a temporary registration request message requesting temporary registration of the M2M service platform to the M2M service platform by the second user terminal.

Here, the temporary registration request message may be an SIP message including an encryption key for data use of the second user terminal included in the registration request message, and the SIP message may further include specification information of the second user terminal .

Also, the step of permitting temporary registration may include comparing the encryption key included in the temporary registration request message with the encryption key included in the registration request message, and storing the specification information of the second user terminal .

Wherein the step of transmitting the data may include transcoding according to the specification of the second user terminal.

In addition, the step of permitting temporary registration may include modifying the resource of the M2M service platform for provisional registration of the second user terminal.

According to another aspect of the present invention, there is provided a method for providing an IMS network to a second user terminal that is not subscribed to the M2M service platform by using data available to a first user terminal subscribed to an M2M service platform, The M2M service platform transmits a registration request message to the second user terminal through the IMS network in response to a request from the first user terminal and informs the second user terminal of the usage right of the M2M service platform And transmits the data to the second user terminal by using the signal path.

Here, the M2M service platform may transmit the registration request message to the second user terminal using the domain information of the communication network to which the second user terminal received from the ENUM server is connected.

The temporary registration request message requesting the registration request message and the temporary registration may be an SIP message including an encryption key for data use of the second user terminal, And the specification information of the image forming apparatus.

In addition, the M2M service platform may discard the temporary registration after transmitting the data to the second user terminal.

Also, the M2M service platform may charge the first user for data transmitted to the second user terminal through the IMS network.

According to the present invention, the M2M data can be routed utilizing the IMS infrastructure established for interworking between mobile communication companies, and service profile and QoS management can be efficiently performed for each subscriber.

Further, according to the present invention, since the IMS network of an already authenticated mobile communication company is used, the authentication procedure for the NA of the third party to use the data can be simplified, security and QoS support for the signal path and the data path can be performed , It becomes easy to formulate a packet charge for the sending and receiving M2M data.

On the other hand, M2M service platform operators can offer the opportunity to give value to M2M data by distributing static data which is stored for individual users of M2M service and only available to individual users, There is an effect that new revenue generation opportunities can be provided through the billing.

1 shows an example of an architecture for an M2M service including a device and gateway domain and a network domain according to the conventional ETSI standard.
FIG. 2 is an illustration for explaining that data accumulated in different M2M service platforms in an environment according to the ETSI standard is not available.
FIG. 3 is a diagram schematically illustrating a procedure of exchanging data between NAs subscribed to different M2M service platforms according to a preferred embodiment of the present invention.
4A and 4B are flow charts for explaining the procedure shown in FIG. 3 in more detail.
5 is a diagram illustrating an exemplary configuration of scl resources to be registered in an IMS service platform in order to perform a procedure according to the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention will now be described in more detail with reference to the accompanying drawings. The present invention is capable of various modifications and various forms, and specific embodiments are illustrated in the drawings and described in detail in the text. It should be understood, however, that the invention is not intended to be limited to the particular forms disclosed, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

Like reference numerals are used for like elements in describing each drawing. In the accompanying drawings, the dimensions of the structures are enlarged to illustrate the present invention in order to clarify the present invention. Here, the terms first, second, etc. may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another. For example, without departing from the scope of the present invention, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component. The singular expressions include plural expressions unless the context clearly dictates otherwise.

In this application, the terms "comprises", "having", and the like are used to specify that a feature, a number, a step, an operation, an element, a part or a combination thereof is described in the specification, But do not preclude the presence or addition of one or more other features, integers, steps, operations, components, parts, or combinations thereof.

Also, unless otherwise defined, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries are to be interpreted as having a meaning consistent with the contextual meaning of the related art and are to be interpreted as either ideal or overly formal in the sense of the present application Do not.

FIG. 3 is a diagram schematically illustrating a procedure of locating NA, subscribing to an M2M service, and exchanging data between NAs subscribed to different M2M service platforms using an IMS infrastructure according to a preferred embodiment of the present invention. Here, 3GPP IMS (IP Multimedia Subsystem) refers to a standardized network technology defined for providing voice, video, audio and data as packet-based services based on Internet Protocol (IP). Using the IMS network, various requirements such as user authentication / authority management, packet unit billing of data exchanged by the user, and stopping the delinquent customer service are solved in the IP base. Major services based on IMS that are currently provided include Voice over LTE (VoLTE), Packet Switch Video Telephone (PSVT), Media CID (MCID), Rich Communication-Suite (RCS), and intelligent network services. The IMS network is interworked with each other to enable service connection between subscribers of the subnet and other networks.

The procedure shown in Fig. 3 is a procedure in which a user A who is subscribed to the M2M service platform A 11 receives an M2M service (hereinafter referred to as " NA A " To the NA 35 (hereinafter referred to as " NA C ") implemented in the communication terminal 32 of the user C subscribed to the M2M service platform C 12. Here, the user C M2M service platform A 11 and M2M service platform C 12 are subscribed to M2M service platform C 12 but not subscribed to M2M service platform A 11 and M2M service platform A 11 and M2M service platform C 12 are subscribed to different communication networks 100 and 200 ). ≪ / RTI >

The user terminals 31 and 32 can operate with the IMS platforms 21 and 22 to which the user terminals 31 and 32 are connected through the wired / wireless network by mounting the SIP clients 34 and 36, A mobile terminal capable of receiving multimedia services such as video, chatting, and the like. Also, the user terminals 31 and 32 may be interworking with the IMS platforms 21 and 22, respectively, and may be interworked with NSCLs 11 and 12, which are M2M service platforms, respectively. Also, the user terminals 31 and 32 may include a terminal that requests an M2M service by mounting an NA for receiving its own M2M service and can use the collected data in a container in the NSCL.

First, in step S41, the user A requests transfer of related data to the NSC 11 (hereinafter referred to as " NSCL A ") as its M2M service platform using the NA A 33 in the NA C 35.

In step S42, the NSCL A 11 finds the NA C 35 through the IMS networks 21 and 22 after confirming that the NA C 35 is not a subscriber of the NSCL A 11, Is a subscriber of the NSCL C (12), and requests the NA C (35) to transmit a temporary registration request message to the NSCL A (11).

In the next step S43, the NSCL A 11 permits provisional registration of the NA C 35 to the NSCL A 11 after receiving the provisional registration request message from the NA C 35.

Thereafter, in step S44, the NSCL A 11 transcodes the data stored in its own container 101 in real time so that the NA C 35 to which temporary registration is permitted is available, and then transmits the data via the IMS networks 21 and 22 And forwards the data to the NA C 35 over the SIP session and data path.

Finally, the NSCL A 11 terminates the SIP session and data path through the IMS network to the NA C 35 after the data transfer to the NA C 35 is completed, and releases the temporary registration of the terminal of the NA C 35 And then charges the data using the IMS network.

4A and 4B are flow charts for explaining the procedure shown in FIG. 3 in more detail.

First, the NA A 33 of the first communication network 100 is registered in its NSCL A 11 in advance to use the M2M service (step S1001).

In the present embodiment, the user terminal 31 equipped with the NA A 33 is equipped with a SIP client 34 capable of providing a multimedia service using the SIP protocol. In order to use the IMS-based service, Is also registered in the CSCF (Call Session Control Function) 115 (step S1002). The CSCF 115 is a system for performing SIP-based call control and session handling functions on a 3G network.

On the other hand, in the case of the NA C 35, similarly to the case of the NA A 33, the NA C 33 is previously registered in the NSCL C 12 in order to use the M2M service provided by the second communication network 300, The SIP client 36 is installed to use the IMS-based service and is registered in advance in the CSCF 315 of the second communication network 300 (steps S1001 'and S1002').

In step S1003, when the NA A 33 requests the NSCL A 11 to transmit to the NA C 35 the data that can be provided through the M2M service to which it belongs, the NSCL A 11 transmits the CSCF 115 ) In response to the request message.

In the present embodiment, the NSCL A 11 directly transmits the request message to the CSCF 115. However, it will be understood that the request message can be transmitted in various ways according to the network structure model. For example, according to the network structure model proposed in Rel-11 SIMTC (System Improvements to MTC), a standard for Machine Type Communications (MTC) in 3GPP (3rd Generation Partnership Project) May be passed to the CSCF 115 via the MTC-IWF instead of being passed directly from the NSCL to the CSCF 115. The MTC-IWF (Interworking Function) is responsible for relaying trigger requests between the M2M service platform (ie, NSCL) located in the external network and the network nodes. The MTC-IWF (Interworking Function) , Which is a newly defined network entity in Rel-11 SIMTC described above, which provides functions such as M2M device / gateway identification, which is a trigger target, by utilizing HSS function.

The CSCF 115 uses the information such as the mobile telephone number of the terminal A 31 included in the request message to inquire whether the terminal A 31 is subscribed to the service related to the present embodiment, (Step S1004), the ENUM (tElephone Number Mapping) server 114 confirms to which communication network the terminal C 32 is subscribed by using the identification information (for example, mobile phone number) of the terminal C 32 (Step S1005). Here, the ENUM is a next-generation integrated identification system service that integrates telephone numbers and Internet addresses so that fixed telephones, mobile phones, e-mails, and websites can be used with only one identification code. Refers to a mechanism that uses the Internet Domain Name System (DNS) to map E. 164, the phone number formatting standard of the Internet, to the Internet Identifier URI (Uinform Resource Identifier).

The ENUM server 114 of the first communication network 100 confirms that the terminal C 32 is a subscriber of the second communication network 300 instead of the first communication network 100 and includes the domain information of the second communication network 300 The CSCF 115 transmits the subscriber inquiry result message to the NSCL A 11 (step S1006). The NSCL A 11 that has confirmed that the terminal C 32 is a subscriber of the second communication network 300 generates related information so that the NA C 35 can temporarily register with the NSCL A 11 and transmits the related information to the second communication network 300 (Step S1007). The IBCF 116 transmits the registration request message to the IBCF 116 (step S1007). Here, IBCF (Interconnection Border Control Function) 116 is a network entity that provides overall control functions related to interworking between IMS service providers. In addition, other network entities may substitute for the network structure model or the detailed configuration of the mobile communication network The possibility is obvious.

The registration request message transmitted in step S1007 can use the SIP messaging method for the registration request to the NSCL A for the terminal C, and the format is as follows, for example:

{Request (Registration), TempAppID (ID_C), SclBaseURI (NSCL_A), SecurityKey (K)}

Here, TempAppID is a unique ID of NA C 35 assigned to identify NA C 35 in NSCL A 11 because all NAs registered in NSCL need a unique ID, and SclBaseURI is NA C 35 is the URI address of NSCL A 11 to send a temporary registration request message as described later, and SecurityKey is an encryption key for use for authentication of NA C 35. The encryption key may be provided to the NS C A 11 to confirm that the NSC A 11 is a terminal for temporary registration by comparing the corresponding key at the time of a temporary registration request to the NS C A 11 of the NA C 35.

In step S1008, the NSCL A 11 counts the waiting time for registration of the NA C 32 while performing its own task. That is, in the above example, it is recorded that ID_C, which is the ID of the NA C 35, and registration waiting for the encryption key K are recorded, and the registration request message transmission time in step S1007 is recorded as the request time t.

In step S1009, the IBCF 116 of the first communication network 100 transmits a registration request message received from the NSCL A 11 to the IBCF 316 of the second communication network 300 in which the terminal C 32 is accommodated.

The IBCF 316 of the second communication network 300 inquires its own CSCF 315 and the HSS 314 and confirms that the terminal C 32 is a terminal registered in its IMS service S1011). Thereafter, in step S1012, the CSCF 315 of the second communication network 300 transmits a corresponding registration request message to the NSCL C 12, and the NSCL C 12 transmits the registration request message to the NA C 35 of the previously registered terminal C 32 (Step S1013).

In step S1014, the NA C 35 transmits to the NSCL A 11 a temporary registration request message including the specification information of its own terminal together with the information in the registration request message. If the time for transmitting the temporary registration request message from the NA C 35 to the NSCL A 11 in step S1014 is t ', the period from the request time t to t' can be defined as the response time.

Thereafter, in step S1015, the NSCL A 11 compares the response time t'-t with a predetermined maximum response time Tms, and transmits the encryption key K included in the temporary registration request message to the registration And compares it with the encryption key included in the request message.

Here, if the response time is within the maximum response time and the transmitted encryption key K is identical, the specification information of the terminal C 32 received from the NA C 35 is stored and the associated scl resource is modified. That is, the NSCL A 11 confirms whether the temporary registration request message from the NA C 35 is a message from the NA C 35 requested by the NA A 33 through comparison of the encryption key value, ) To modify the scl resource of NSCL A (11) for temporary registration. The modification of the scl resource registers the temporary ID (ID_C) of the NA C (35), modifies the access right to the container in which the data requested by the NA A (33) is stored, and performs subscription registration for the corresponding data Content. The subscription registration is for notifying that the requested data is prepared after data transcoding for the requested data according to the specification of the terminal C 32 including the NA C 35.

Thereafter, when the NSCL A 11 transmits the temporary registration completion message to the NA C 35 (step S1016), the normal temporary registration procedure is completed (step S1017).

The procedure after completion of the temporary registration procedure is shown in Fig. 4B. In step S1018, the container 101 of the NSCL A 11 performs transcoding so that the NA C 35 can directly consume the requested data based on the specification information of the terminal C 32 included in the provisional registration request message And notifies the NA C 32 that the data to be consumed by the NA C 32 is ready when the transcoding is completed (step S1019).

The NA C 32 then reads the requested data from the container 101 of the NSCL A 11 (step S1020). At this time, if the NA C 32 tries to access data other than the corresponding data, it will be rejected because the access right is not registered in the container of the NSCL A 11.

After all of the corresponding data is transmitted in step S1021, the NSCL A 11 exchanges the transmission completion messages with each other. Then, the NSCL A 11 calculates the packet size of the data sent to the NA C (35) And transmits it to the AAA server 113 of the first communication network 100 (step S1022).

Thereafter, temporary registration with respect to the NA C 35 is canceled (step S1023). After the provisional registration is terminated, all data requests or provisional registration requests from the terminal C 32 are rejected (steps S1024 and S1025) unless a separate provisional registration procedure as described above is separately performed.

FIG. 5 is a diagram illustrating an exemplary configuration of scl resources to be registered in the NSCL in order to perform a procedure according to the present invention.

In order to perform the procedure according to the present invention as shown in FIG. 5, in addition to the resources related to NSCL A and NA A as defined in the ETSI standard, a resource (ID_for_C) for provisional registration of NA C for NSCL A . Here, the resource may be configured to include a lower resource such as containers, access rights, subscriptions, and the like.

Details of various resources are defined in the above-mentioned ETSI standard, and the description thereof will be omitted for the sake of convenience. The structure of the above-described resources has been described by way of example only, and it will be apparent to those skilled in the art that other resource structures are possible.

33, 35: Network application (NA)
11, 12: M2M service platform or NSCL
113: AAA server
114: ENUM server
115, 315: CSCF 116,
316: IBCF
314: HSS

Claims (17)

  1. A method for delivering data available to a first user terminal subscribed to an M2M service platform to a second user terminal not subscribed to the M2M service platform through an IMS network,
    Transmitting a registration request message to the second user terminal through the IMS network in response to a request from the first user terminal;
    Allowing the second user terminal to perform provisional registration for granting a use right of the M2M service platform; And
    Establishing a signal path through the IMS network and transferring the data to the second user terminal using the signal path
    And transmitting the M2M data through the IMS network.
  2. The method according to claim 1,
    Wherein the registration request message is an SIP message including address information of the M2M service platform.
  3. 3. The method of claim 2,
    Wherein the SIP message further comprises an encryption key for data usage of the second user terminal.
  4. The method according to claim 1,
    And transmitting the registration request message to the second user terminal using the domain information of the communication network to which the second user terminal received from the ENUM server belongs.
  5. The method according to claim 1,
    Wherein the step of permitting temporary registration further comprises the step of transmitting a temporary registration request message requesting temporary registration of the M2M service platform to the M2M service platform by the second user terminal. Gt; M2M < / RTI >
  6. 6. The method of claim 5,
    Wherein the temporary registration request message is an SIP message including an encryption key for data use of the second user terminal included in the registration request message.
  7. The method according to claim 6,
    Wherein the SIP message further includes specification information of the second user terminal.
  8. 6. The method of claim 5,
    The step of permitting temporary registration includes the step of comparing the encryption key included in the temporary registration request message with the encryption key included in the registration request message and storing the specification information of the second user terminal A method for delivering M2M data over an IMS network.
  9. 8. The method of claim 7,
    Wherein the step of transmitting the data comprises transcoding according to the specification of the second user terminal.
  10. 6. The method of claim 5,
    Wherein the granting of the temporary registration comprises modifying a resource of the M2M service platform for provisional registration of the second user terminal.
  11. The method according to claim 1,
    Further comprising the step of charging the first user terminal for data transmitted to the second user terminal via the IMS network.
  12. An M2M service platform for delivering data available to a first user terminal subscribed to an M2M service platform to a second user terminal not subscribed to the M2M service platform through an IMS network,
    Transmits a registration request message to the second user terminal through the IMS network in response to a request from the first user terminal, permits provisional registration for granting the use authority of the M2M service platform to the second user terminal And establishes a signal path through the IMS network and transmits the data to the second user terminal using the signal path.
  13. 13. The method of claim 12,
    And transmits the registration request message to the second user terminal using the domain information of the communication network to which the second user terminal received from the ENUM server belongs.
  14. 13. The method of claim 12,
    Wherein the registration request message and the temporary registration request message requesting the temporary registration are SIP messages including an encryption key for data use of the second user terminal.
  15. 15. The method of claim 14,
    Wherein the temporary registration request message further includes specification information of the second user terminal.
  16. 13. The method of claim 12,
    And discards the temporary registration after transmitting the data to the second user terminal.
  17. 16. The method of claim 15,
    And charges the first user for data transmitted to the second user terminal through the IMS network.
KR1020130023315A 2013-03-05 2013-03-05 Method for Sending M2M Data through IMS Network and M2M Service Platform therefor KR101441567B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020130023315A KR101441567B1 (en) 2013-03-05 2013-03-05 Method for Sending M2M Data through IMS Network and M2M Service Platform therefor

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020130023315A KR101441567B1 (en) 2013-03-05 2013-03-05 Method for Sending M2M Data through IMS Network and M2M Service Platform therefor
US14/196,906 US9491567B2 (en) 2013-03-05 2014-03-04 Providing M2M data to unregistered terminal

Publications (2)

Publication Number Publication Date
KR20140109085A KR20140109085A (en) 2014-09-15
KR101441567B1 true KR101441567B1 (en) 2014-09-22

Family

ID=51488396

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020130023315A KR101441567B1 (en) 2013-03-05 2013-03-05 Method for Sending M2M Data through IMS Network and M2M Service Platform therefor

Country Status (2)

Country Link
US (1) US9491567B2 (en)
KR (1) KR101441567B1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101600422B1 (en) 2012-08-14 2016-03-21 주식회사 케이티 Method and System for Continuously Providing Monitoring Information Service to Calling Station and Any Other Stations
KR101550062B1 (en) 2013-02-26 2015-09-04 주식회사 케이티 A Method for Sharing Control Right of M2M Device, and A M2M Service Platform for the Same
KR101441567B1 (en) * 2013-03-05 2014-09-22 주식회사 케이티 Method for Sending M2M Data through IMS Network and M2M Service Platform therefor
KR20160045505A (en) * 2014-10-17 2016-04-27 삼성전자주식회사 Terminal for internet of things and operation method of the same
CN105592400A (en) * 2014-10-24 2016-05-18 中兴通讯股份有限公司 Registration method and communication method for application dedicated nodes, and nodes
US9838258B2 (en) 2014-12-04 2017-12-05 At&T Intellectual Property I, L.P. Network service interface for machine-to-machine applications
WO2016119110A1 (en) * 2015-01-26 2016-08-04 华为技术有限公司 Resource access method, related device and m2m system
CN104994553A (en) * 2015-04-30 2015-10-21 北京海尔广科数字技术有限公司 Method of sending messages among Internet of Things devices
US20170272121A1 (en) * 2016-03-15 2017-09-21 Huawei Technologies Co., Ltd. System and method for relaying data over a communication network
US10129852B2 (en) * 2016-06-01 2018-11-13 Lg Electronics Inc. Method for broadcasting to unspecified entity in wireless communication system and device for the same
KR20190062801A (en) * 2017-11-29 2019-06-07 전자부품연구원 oneM2M-based Data Monitoring API Configuration Method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080024481A (en) * 2005-05-23 2008-03-18 지멘스 에스.피.에이. Method and system for the remote management of a machine via ip links of an ip multimedia subsystem, ims
KR100909542B1 (en) * 2005-08-01 2009-07-27 삼성전자주식회사 Method and apparatus for interworking voice and multimedia services between the UE and the Csi ims terminal
KR20120093559A (en) * 2011-02-15 2012-08-23 삼성전자주식회사 Apparatus and method for transmitting and receiving machine to machine data in wilress communication system
KR20120098899A (en) * 2009-12-22 2012-09-05 인터디지탈 패튼 홀딩스, 인크 Group-based machine to machine communication

Family Cites Families (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3105361B2 (en) * 1992-08-19 2000-10-30 エヌ・ティ・ティ・コミュニケーションウェア株式会社 Authentication method in a mobile communication system
JPH10240819A (en) 1997-02-28 1998-09-11 Oki Electric Ind Co Ltd Unmanned automatic contract accepting system
EP1219068B1 (en) 1999-08-13 2007-12-26 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Home intercom system, transport platform for an intercom system and an intelligent mains receiver for a home intercom system
US6970183B1 (en) 2000-06-14 2005-11-29 E-Watch, Inc. Multimedia surveillance and monitoring system including network configuration
KR100419422B1 (en) 2001-05-24 2004-02-19 삼성전자주식회사 Rescue method in bluetooth system
US20050021785A1 (en) 2001-10-05 2005-01-27 Hiroshi Nakaji Control server and remote control system for the same
JP2005513931A (en) 2001-12-21 2005-05-12 株式会社日立製作所 Mobile communication network
US6947411B2 (en) 2002-10-21 2005-09-20 Sprint Communications Company L.P. Digital data communication system using video telephony
KR100673165B1 (en) 2003-07-14 2007-01-22 에스케이 텔레콤주식회사 Method And System Of Redirecting Call/Session Based On SIP When Called Party Is Busy
JP4297768B2 (en) 2003-10-31 2009-07-15 発紘電機株式会社 Monitoring data collection device and monitoring data collection method for multiple programmable controllers
US20070153993A1 (en) 2004-02-02 2007-07-05 Mobile Reach Media Inc. Monitoring method and system
JP4725066B2 (en) 2004-09-30 2011-07-13 セイコーエプソン株式会社 Printing device monitoring system, network board, and printing device monitoring method
US20060173708A1 (en) 2005-01-28 2006-08-03 Circle Of Care, Inc. System and method for providing health care
KR100713359B1 (en) 2005-02-03 2007-05-04 삼성전자주식회사 Visual TelePhony Method of Capable to Providing Video in Another Display
KR100647819B1 (en) 2005-03-02 2006-11-23 에스케이 텔레콤주식회사 System and method for monitoring home using the IP phone
US20140072309A9 (en) * 2005-12-29 2014-03-13 Monster Cable Products, Inc. Infra-red repeater in power centers
US7542768B2 (en) * 2006-03-23 2009-06-02 Alcatel-Lucent Usa Inc. Dynamic ring start delay based on multiple factors
WO2007120921A2 (en) * 2006-04-14 2007-10-25 Aicent, Inc. Fixed mobile roaming service solution
US10223891B2 (en) 2006-05-17 2019-03-05 Peter Chlubek Real-time multi-component web based travel safety system and method
KR20080050044A (en) 2006-12-01 2008-06-05 주식회사 케이티 Session transfer method for mobile multimedia communications
US9332575B2 (en) * 2007-06-27 2016-05-03 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for enabling connectivity in a communication network
KR20090051933A (en) 2007-11-20 2009-05-25 (주) 엘지텔레콤 Video call method and system for transmitting video call data and contents
KR101731200B1 (en) 2008-01-18 2017-05-11 인터디지탈 패튼 홀딩스, 인크 Method and apparatus for enabling machine to machine communication
US8553883B2 (en) * 2008-02-22 2013-10-08 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for managing subscription credentials in a wireless communication device
JP5038956B2 (en) 2008-03-27 2012-10-03 パナソニック株式会社 Network system
WO2009122219A1 (en) * 2008-04-02 2009-10-08 Vodafone Group Plc Telecommunications network
US8259659B2 (en) * 2008-07-03 2012-09-04 Apple Inc. Apparatus and methods for managing access and update requests in a wireless network
KR101183995B1 (en) 2008-09-08 2012-09-18 에스케이텔레콤 주식회사 System and Method for setting session of based SIP
US8049613B2 (en) 2008-11-26 2011-11-01 Comcast Cable Holdings, Llc Building security system
KR20100061295A (en) 2008-11-28 2010-06-07 삼성전자주식회사 Method and system for controlling a session for interworking in converged ip messaging service
ES2394978T3 (en) * 2008-12-01 2013-02-07 Vodafone Holding Gmbh Access control for M2M devices ("machine or machine") in a mobile communications network
US20100318913A1 (en) * 2009-06-15 2010-12-16 Shiraz Cupala Method and apparatus of providing graphical user interface for visually streaming media
US8937658B2 (en) 2009-10-15 2015-01-20 At&T Intellectual Property I, L.P. Methods, systems, and products for security services
US20110235520A1 (en) 2010-03-26 2011-09-29 Calabrio, Inc. Live monitoring of call sessions over an ip telephony network
WO2011132953A2 (en) * 2010-04-21 2011-10-27 Samsung Electronics Co., Ltd. Communication system having plural terminals and method for controlling terminal in communication system
KR20110133709A (en) 2010-06-07 2011-12-14 에스케이텔레콤 주식회사 System and method for control remote access to home network
US20110321147A1 (en) 2010-06-28 2011-12-29 International Business Machines Corporation Dynamic, temporary data access token
KR20120050738A (en) 2010-11-11 2012-05-21 한국전자통신연구원 Multimedia session transfer control system and control method the same
US8862878B2 (en) 2010-11-19 2014-10-14 International Business Machines Corporation Authentication and authorization of a device by a service using broadcast encryption
KR20120056401A (en) 2010-11-25 2012-06-04 에스케이플래닛 주식회사 Service sharing system, network terminal device, service apparatus, and service sharing method
EP2656543B1 (en) 2010-12-20 2015-02-25 Telefonaktiebolaget LM Ericsson (PUBL) Method of and device for service monitoring and service monitoring management
US9055534B2 (en) 2011-01-10 2015-06-09 Lg Electronics Inc. Method for determining transmission power for transmitting uplink signals between terminals in a wireless communication system that supports terminal-to-terminal communication, and apparatus therefor
KR101338489B1 (en) * 2011-02-07 2013-12-10 주식회사 케이티 Mobile communication system, each of processing method in registered m2m terminal and unenrolled m2m terminal for signalling load balancing
US9497102B2 (en) 2011-12-06 2016-11-15 Qualcomm Incorporated Systems and methods for machine to machine device control and triggering
EP2815590B1 (en) * 2012-02-13 2016-12-21 Telefonaktiebolaget LM Ericsson (publ) M2m service enablement over access networks
US8782195B2 (en) 2012-03-14 2014-07-15 Telefonaktiebolaget L M Ericsson (Publ) Group operations in machine-to-machine networks using a shared identifier
US20150055557A1 (en) * 2012-03-22 2015-02-26 Interdigital Patent Holdings, Inc. Method and apparatus for supporting machine-to-machine caching at a service capability layer
US9088585B2 (en) 2012-06-28 2015-07-21 Verizon Patent And Licensing Inc. Selection of network-to-network interface device
US9125076B2 (en) * 2012-08-02 2015-09-01 Openet Telecom Ltd. System and method for providing detection of signaling-only engagements in a telecommunication network
US9900171B2 (en) * 2013-02-25 2018-02-20 Qualcomm Incorporated Methods to discover, configure, and leverage relationships in internet of things (IoT) networks
KR101550062B1 (en) * 2013-02-26 2015-09-04 주식회사 케이티 A Method for Sharing Control Right of M2M Device, and A M2M Service Platform for the Same
KR101441567B1 (en) * 2013-03-05 2014-09-22 주식회사 케이티 Method for Sending M2M Data through IMS Network and M2M Service Platform therefor

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080024481A (en) * 2005-05-23 2008-03-18 지멘스 에스.피.에이. Method and system for the remote management of a machine via ip links of an ip multimedia subsystem, ims
KR100909542B1 (en) * 2005-08-01 2009-07-27 삼성전자주식회사 Method and apparatus for interworking voice and multimedia services between the UE and the Csi ims terminal
KR20120098899A (en) * 2009-12-22 2012-09-05 인터디지탈 패튼 홀딩스, 인크 Group-based machine to machine communication
KR20120093559A (en) * 2011-02-15 2012-08-23 삼성전자주식회사 Apparatus and method for transmitting and receiving machine to machine data in wilress communication system

Also Published As

Publication number Publication date
KR20140109085A (en) 2014-09-15
US9491567B2 (en) 2016-11-08
US20140256285A1 (en) 2014-09-11

Similar Documents

Publication Publication Date Title
US7664495B1 (en) Voice call redirection for enterprise hosted dual mode service
JP4567752B2 (en) Method and apparatus for handling emergency calls
JP5514866B2 (en) System and method for routing an incoming call to an appropriate domain within a network environment including IMS
TWI489893B (en) Apparatus and method to efficiently send device trigger messages
EP2016780B1 (en) Method, short message service center and system for delivery of short message service messages
US8984113B2 (en) Internet of things service architecture and method for realizing internet of things service
US7136651B2 (en) Mobile services control platform providing a converged voice service
US8392582B2 (en) Method and apparatuses for making use of virtual IMS subscriptions coupled with the identity of a non SIP compliant terminal for non-registered subscribers
EP1892897B2 (en) A cross-domain routing control method
US8499082B2 (en) Methods, systems, and computer readable media for providing services in a telecommunications network using interoperability specification/session initiation protocol (IOS/SIP) adapter
US20090075684A1 (en) Apparatus and method for routing message service
US20070223462A1 (en) Enhanced service delivery platform that provides a common framework for use by IMS and Web applications in delivering services
ES2360616T3 (en) Method and appliance to selectly reduce session control for a multimedia internet protocol subsystem.
CN103534960B (en) Method and apparatus for the MTC in wireless communication system
JP5080465B2 (en) Method and system for translating messages
EP2028815A1 (en) The method and system for delivering the message service data
US9986414B1 (en) Dynamic CSCF assignment
JP2008541617A (en) Short message service encapsulation of additional service requests in IMS
JP2008236183A (en) Call session control server assignment method and system
JP5793812B2 (en) Method, network side device, user equipment, and network system for triggering data offload
US8924552B2 (en) Remote and local compound device capabilities synchronization method and system
KR20080043266A (en) System and method for providing a converged messaging service
CN101984713A (en) Method, terminal and system for realizing business data shunting
KR20060074037A (en) Method for processing call to unregistered user in wlan-gprs network using sip
EP3456090A1 (en) Connecting to virtualized mobile core networks

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20170904

Year of fee payment: 4

FPAY Annual fee payment

Payment date: 20180903

Year of fee payment: 5

FPAY Annual fee payment

Payment date: 20190807

Year of fee payment: 6